By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Sécurité Helvétique News | AmyrisSécurité Helvétique News | AmyrisSécurité Helvétique News | Amyris
  • Home
  • Compliance
    Compliance
    Show More
    Top News
    Shifting Sands: Leaders Are Feeling the Pressure of an Uncertain, Dynamic Risk Landscape
    23 February 2023
    How to Stay Ahead of Mobility Tax & Compliance Trends
    23 January 2024
    The Long and Winding Road to Custom-AI Compliance
    2 August 2024
    Latest News
    Fractured & Fraught — but Still Potentially Profitable: The State of ESG in 2025
    7 November 2025
    UK AML Reform in 2025: A Public Recalibration of Risk and Responsibility
    1 November 2025
    US National Security Compliance Risk & Readiness Report
    26 October 2025
    What Would a Farage Government Mean for Compliance?
    20 October 2025
  • Cyber Security
    Cyber Security
    Show More
    Top News
    Scandinavian Airlines website hit by cyber attack, customer details exposed
    21 February 2023
    Planet Ice hacked! 240,000 skating fans’ details stolen
    22 February 2023
    North Korea’s APT37 Targeting Southern Counterpart with New M2RAT Malware
    23 February 2023
    Latest News
    North Korean Hackers Target Developers with Malicious npm Packages
    30 August 2024
    Russian Hackers Exploit Safari and Chrome Flaws in High-Profile Cyberattack
    29 August 2024
    Vietnamese Human Rights Group Targeted in Multi-Year Cyberattack by APT32
    29 August 2024
    2.5 Million Reward Offered For Cyber Criminal Linked To Notorious Angler Exploit Kit
    29 August 2024
  • Technology
    Technology
    Show More
    Top News
    The Myth of the Psychopathic Personality Refuses to Die
    21 February 2023
    Spotify’s New ‘AI DJ’ Mimics the Worst Parts of Listening to the Radio
    22 February 2023
    ‘Cocaine Bear’ review: A wild true story becomes a bonkers comedy, and yet…
    23 February 2023
    Latest News
    Why XSS still matters: MSRC’s perspective on a 25-year-old threat  | MSRC Blog
    9 September 2025
    Microsoft Bug Bounty Program Year in Review: $13.8M in Rewards | MSRC Blog
    28 August 2025
    Microsoft Bounty Program Year in Review: $16.6M in Rewards  | MSRC Blog
    27 August 2025
    postMessaged and Compromised | MSRC Blog
    26 August 2025
  • Businness
    Businness
    Show More
    Top News
    Sunak secures backing of key Brexiters for N Ireland trade deal
    21 February 2023
    David Bowie’s vast archive donated to V&A Museum
    23 February 2023
    Russia’s war in Ukraine drags into second year with no end in sight By Reuters
    24 February 2023
    Latest News
    Microvast Holdings earnings beat by $0.02, revenue topped estimates
    11 November 2025
    Client Challenge
    10 November 2025
    Peter Thiel warns if you ‘proletarianize the young people,’ don’t be surprised they end up communist
    9 November 2025
    US Supreme Court lets Trump withhold $4 billion in food aid funding for now
    8 November 2025
  • ÉmissionN
    Émission
    Cyber Security Podcasts
    Show More
    Top News
    Cyber Safety. Protecting Yourself On The Internet. Scott Schober, Author & CEO, Berkeley Varitronics
    24 February 2023
    Dad Jokes. Bringing Comedy To Cybersecurity. James McQuiggan, Security Awareness Advocate, KnowBe4.
    3 March 2023
    Stream episode Cybercrime Wire For Mar. 10, 2023. Cyberattack On Parques Reunidos Group. WCYB Digital Radio. by Cybercrime Magazine podcast
    12 March 2023
    Latest News
    Stream episode Cybercrime Magazine Update: Cybercrime In India. Sheer Volume Overwhelming Police Forces. by Cybercrime Magazine podcast
    3 March 2025
    Autonomous SOC. Why It’s A Breakthrough For The Mid-Market. Subo Guha, SVP of Product, Stellar Cyber
    2 March 2025
    Cyber Safety. Protecting Families From Smart Toy Risks. Scott Schober, Author, "Hacked Again."
    2 March 2025
    Cybercrime News For Feb. 25, 2025. Hackers Steal $49M from Infini Crypto Fintech. WCYB Digital Radio
    2 March 2025
Search
Cyber Security
  • Application Security
  • Darknet
  • Data Protection
  • network vulnerability
  • Pentesting
Compliance
  • LPD
  • RGPD
  • Finance
  • Medical
Technology
  • AI
  • MICROSOFT
  • VERACODE
  • CHECKMARKX
  • WITHSECURE
  • Amyris
  • Contact
  • Disclaimer
  • Privacy Policy
  • About us
© 2023 Sécurité Helvétique NEWS par Amyris Sarl. Tous droits réservés
Reading: FakeBat Loader Malware Spreads Widely Through Drive-by Download Attacks
Share
Sign In
Notification Show More
Font ResizerAa
Sécurité Helvétique News | AmyrisSécurité Helvétique News | Amyris
Font ResizerAa
  • Home
  • Compliance
  • Cyber Security
  • Technology
  • Business
Search
  • Home
    • Compliance
    • Cyber Security
    • Technology
    • Businness
  • Legal Docs
    • Contact us
    • Disclaimer
    • Privacy Policy
    • About us
Have an existing account? Sign In
Follow US
  • Amyris
  • Contact
  • Disclaimer
  • Privacy Policy
  • About us
© 2023 Sécurité Helvétique par Amyris Sarl.
Sécurité Helvétique News | Amyris > Blog > Cyber Security > FakeBat Loader Malware Spreads Widely Through Drive-by Download Attacks
Cyber Security

FakeBat Loader Malware Spreads Widely Through Drive-by Download Attacks

webmaster
Last updated: 2024/07/03 at 9:19 AM
webmaster
Share
5 Min Read
SHARE

Jul 03, 2024NewsroomMalware / SEO Poisoning

The loader-as-a-service (LaaS) known as FakeBat has become one of the most widespread loader malware families distributed using the drive-by download technique this year, findings from Sekoia reveal.

“FakeBat primarily aims to download and execute the next-stage payload, such as IcedID, Lumma, RedLine, SmokeLoader, SectopRAT, and Ursnif,” the company said in a Tuesday analysis.

Drive-by attacks entail the use of methods like search engine optimization (SEO) poisoning, malvertising, and nefarious code injections into compromised sites to entice users into downloading bogus software installers or browser updates.

The use of malware loaders over the past few years dovetails with the growing use of landing pages impersonating legitimate software websites by passing them off as legitimate installers. This ties into the larger aspect that phishing and social engineering remain one of the threat actors’ main ways to acquire initial access.

Cybersecurity

FakeBat, also known as EugenLoader and PaykLoader, has been offered to other cybercriminals under a LaaS subscription model on underground forums by a Russian-speaking threat actor named Eugenfest (aka Payk_34) since at least December 2022.

The loader is designed to bypass security mechanisms and provides customers with options to generate builds using templates to trojanize legitimate software as well as monitor installations over time through an administration panel.

While the earlier versions made use of an MSI format for the malware builds, recent iterations observed since September 2023 have switched to an MSIX format and added a digital signature to the installer with a valid certificate to sidestep Microsoft SmartScreen protections.

The malware is available for $1,000 per week and $2,500 per month for the MSI format, $1,500 per week and $4,000 per month for the MSIX format, and $1,800 per week and $5,000 per month for the combined MSI and signature package.

Sekoia said it detected different activity clusters disseminating FakeBat by three primary approaches: Impersonating popular software through malicious Google ads, fake web browser updates via compromised sites, and social engineering schemes on social networks. This encompasses campaigns likely related to the FIN7 group, Nitrogen, and BATLOADER.

“In addition to hosting payloads, FakeBat [command-and-control] servers highly likely filter traffic based on characteristics such as the User-Agent value, the IP address, and the location,” Sekoia said. “This enables the distribution of the malware to specific targets.”

The disclosure comes as the AhnLab Security Intelligence Center (ASEC) detailed a malware campaign distributing another loader named DBatLoader (aka ModiLoader and NatsoLoader) through invoice-themed phishing emails.

It also follows the discovery of infection chains propagating Hijack Loader (aka DOILoader and IDAT Loader) via pirated movie download sites to ultimately deliver the Lumma information stealer.

“This IDATLOADER campaign is using a complex infection chain containing multiple layers of direct code-based obfuscation alongside innovative tricks to further hide the maliciousness of the code,” Kroll researcher Dave Truman said.

Cybersecurity

“The infection hinged around utilizing Microsoft’s mshta.exe to execute code buried deep within a specially crafted file masquerading as a PGP Secret Key. The campaign made use of novel adaptations of common techniques and heavy obfuscation to hide the malicious code from detection.”

Phishing campaigns have further been observed delivering Remcos RAT, with a new Eastern European threat actor dubbed Unfurling Hemlock leveraging loaders and emails to drop binary files that act as a “cluster bomb” to spread different malware strains at once.

“The malware being distributed using this technique is mostly comprised of stealers, such as RedLine, RisePro, and Mystic Stealer, and loaders such as Amadey and SmokeLoader,” Outpost24 researcher Hector Garcia said.

“Most of the first stages were detected being sent via email to different companies or being dropped from external sites that were contacted by external loaders.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

You Might Also Like

North Korean Hackers Target Developers with Malicious npm Packages

Russian Hackers Exploit Safari and Chrome Flaws in High-Profile Cyberattack

Vietnamese Human Rights Group Targeted in Multi-Year Cyberattack by APT32

2.5 Million Reward Offered For Cyber Criminal Linked To Notorious Angler Exploit Kit

Unpatched AVTECH IP Camera Flaw Exploited by Hackers for Botnet Attacks

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Whatsapp Whatsapp LinkedIn Reddit Telegram Email Copy Link Print
Share
Previous Article How to Get Kids Focused on Their Online Privacy
Next Article Consumer Security. Google's Family Password Manager. Burton Kelso, The Technology Expert.
Leave a comment Leave a comment

Comments (0) Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

235.3k Followers Like
69.1k Followers Follow
11.6k Followers Pin
56.4k Followers Follow
136k Subscribers Subscribe
4.4k Followers Follow
- Advertisement -
Ad imageAd image

Latest News

SessionReaper (CVE-2025-54236) Exploited in Adobe Commerce
VERACODE 11 November 2025
From Prompt Injection To Account Takeover · Embrace The Red
Pentesting 11 November 2025
Microvast Holdings earnings beat by $0.02, revenue topped estimates
Businness 11 November 2025
From Prompt Injection To Account Takeover · Embrace The Red
Pentesting 11 November 2025
//

We influence 20 million users and is the number one business and technology news network on the planet

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

Loading
Sécurité Helvétique News | AmyrisSécurité Helvétique News | Amyris
Follow US
© 2023 Sécurité Helvétique NEWS par Amyris Sarl. Tous droits réservés
Amyris news letter
Join Us!

Subscribe to our newsletter and never miss our latest news, podcasts etc..

Loading
Zero spam, Unsubscribe at any time.
login Amyris SH
Welcome Back!

Sign in to your account

Lost your password?